Archived: Thwart supply chain attacks by securing development / build vulnerabilities

On-Demand Webcast|1 Hour

Given the spate of software supply chain attacks, organizations need to do more to understand and correct development and build process vulnerabilities. The recent SolarWinds and Kaseya attacks have helped highlight some of the broader and pervasive software supply chain vulnerabilities that impact most organizations today. Modern, agile development, complex code bases and automated build processes have given attackers new ways to exploit systems.

Join our experts on a lively discussion about the key weaknesses in the systems development life cycle and how organizations can design a more secure development, build, and release process.

Discussion topics include:

· the vulnerabilities in modern SDLC processes;
· how a zero-trust philosophy can be applied to this problem; and
· a way to shift left and implement a process for ensuring code provenance.

Attendees of this webcast may be eligible for one CPE credit.


Husnain Bajwa

Senior Manager, Global Sales Engineering

Beyond Identity


Colton Chojnacki

Product Manager

Beyond Identity


Deb Radcliff

Strategic Analyst

CyberRisk Alliance